首页 > 最新文献

Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)最新文献

英文 中文
Managing Variability for Software Product-Line 管理软件产品线的可变性
Young-Gab Kim, Jin-Woo Kim, Sung-Ook Shin, D. Baik
Software development based on the software product-line can develop software products more easily and fast by reusing the developed core assets. One of key issues of software product-line is to handle variability between product families. That is, the variation management for software product-line decides the success of software development. There are considerable researches relating to model the variability in software product-line. However, the existing researches do not explicitly define artifacts and any relevant relationships between them used in each process. Therefore, in this paper, processes and artifacts of each process to manage uniformly variability over the life cycle of software product-line are proposed. Furthermore, in order to show how to apply those into a specific domain, especially electronic medical record (EMR) system, case study is presented
基于软件产品线的软件开发可以通过重用已开发的核心资产,更容易、更快速地开发软件产品。软件产品线的关键问题之一是处理产品族之间的可变性。也就是说,软件产品线的变更管理决定着软件开发的成败。对软件产品线的可变性进行建模的研究相当多。然而,现有的研究并没有明确地定义每个过程中使用的工件以及它们之间的任何相关关系。因此,本文提出了在软件产品线的生命周期中统一管理可变性的过程和每个过程的工件。此外,为了说明如何将其应用于特定领域,特别是电子病历(EMR)系统,本文给出了一个案例研究
{"title":"Managing Variability for Software Product-Line","authors":"Young-Gab Kim, Jin-Woo Kim, Sung-Ook Shin, D. Baik","doi":"10.1109/SERA.2006.45","DOIUrl":"https://doi.org/10.1109/SERA.2006.45","url":null,"abstract":"Software development based on the software product-line can develop software products more easily and fast by reusing the developed core assets. One of key issues of software product-line is to handle variability between product families. That is, the variation management for software product-line decides the success of software development. There are considerable researches relating to model the variability in software product-line. However, the existing researches do not explicitly define artifacts and any relevant relationships between them used in each process. Therefore, in this paper, processes and artifacts of each process to manage uniformly variability over the life cycle of software product-line are proposed. Furthermore, in order to show how to apply those into a specific domain, especially electronic medical record (EMR) system, case study is presented","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Monitoring and Improving the Quality of ODC Data using the "ODC Harmony Matrices": A Case Study 使用“ODC和谐矩阵”监测和改进ODC数据的质量:一个案例研究
Nirav Saraiya, Jason E. Lohner, Jongmoon Baik
Orthogonal defect classification (ODC) is an advanced software engineering technique to provide in-process feedback to developers and testers using defect data. ODC institutionalization in a large organization involves some challenging roadblocks such as the poor quality of the collected data leading to wrong analysis. In this paper, we have proposed a technique ('Harmony Matrix') to improve the data collection process. The ODC Harmony Matrix has useful applications. At the individual defect level, results can be used to raise alerts to practitioners at the point of data collection if a low probability combination is chosen. At the higher level, the ODC Harmony Matrix helps in monitoring the quality of the collected ODC data. The ODC Harmony Matrix complements other approaches to monitor and enhances the ODC data collection process and helps in successful ODC institutionalization, ultimately improving both the product and the process. The paper also describes precautions to take while using this approach
正交缺陷分类(ODC)是一种先进的软件工程技术,它使用缺陷数据向开发人员和测试人员提供过程中反馈。大型组织中的ODC制度化涉及一些具有挑战性的障碍,例如收集的数据质量差,导致错误的分析。在本文中,我们提出了一种技术(“和谐矩阵”)来改进数据收集过程。ODC和谐矩阵有很多有用的应用。在单个缺陷级别,如果选择了低概率的组合,结果可以用于在数据收集点向从业者发出警报。在更高的级别上,ODC和谐矩阵有助于监视所收集的ODC数据的质量。ODC和谐矩阵补充了监视和增强ODC数据收集过程的其他方法,并有助于ODC成功制度化,最终改进产品和过程。本文还描述了使用这种方法时应采取的预防措施
{"title":"Monitoring and Improving the Quality of ODC Data using the \"ODC Harmony Matrices\": A Case Study","authors":"Nirav Saraiya, Jason E. Lohner, Jongmoon Baik","doi":"10.1109/SERA.2006.52","DOIUrl":"https://doi.org/10.1109/SERA.2006.52","url":null,"abstract":"Orthogonal defect classification (ODC) is an advanced software engineering technique to provide in-process feedback to developers and testers using defect data. ODC institutionalization in a large organization involves some challenging roadblocks such as the poor quality of the collected data leading to wrong analysis. In this paper, we have proposed a technique ('Harmony Matrix') to improve the data collection process. The ODC Harmony Matrix has useful applications. At the individual defect level, results can be used to raise alerts to practitioners at the point of data collection if a low probability combination is chosen. At the higher level, the ODC Harmony Matrix helps in monitoring the quality of the collected ODC data. The ODC Harmony Matrix complements other approaches to monitor and enhances the ODC data collection process and helps in successful ODC institutionalization, ultimately improving both the product and the process. The paper also describes precautions to take while using this approach","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134559541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Inter-Domain Authentication Mechanism for XMPP/Jabber XMPP/Jabber的域间认证机制
Lee-Sub Lee, Kyung-Ryong Choi, Dongwon Jeong, Soo-Hyun Park, JuHum Kwon
Although Jabber started from the instance messaging protocol, it became one of the most important toolkits for developing distributed applications. The existing Jabber authentication model doesn't support a mechanism to enable a client to access the servers in another domain directly. This limitation causes data duplication and synchronization problems in developing Jabber based distributed applications. Thus the study proposes a novel IDA (inter-domain authentication). While the well-known Kerberos authentication protocol provides IRA (inter-realm authentication), it requires all realms to implement Kerberos authentication mechanisms. Thus this cannot be used for developing Jabber services which contains various authentication mechanisms simultaneously. The study also presents the verification of security completeness with formal method, BAN logic
尽管Jabber是从实例消息传递协议开始的,但它已经成为开发分布式应用程序的最重要的工具包之一。现有的Jabber身份验证模型不支持允许客户机直接访问另一个域中的服务器的机制。在开发基于Jabber的分布式应用程序时,这种限制会导致数据重复和同步问题。因此,本研究提出一种新的域间认证方法。虽然众所周知的Kerberos身份验证协议提供了IRA(域间身份验证),但它要求所有领域都实现Kerberos身份验证机制。因此,这不能用于开发同时包含各种身份验证机制的Jabber服务。研究还提出了用形式化方法、BAN逻辑验证安全完备性的方法
{"title":"An Inter-Domain Authentication Mechanism for XMPP/Jabber","authors":"Lee-Sub Lee, Kyung-Ryong Choi, Dongwon Jeong, Soo-Hyun Park, JuHum Kwon","doi":"10.1109/SERA.2006.15","DOIUrl":"https://doi.org/10.1109/SERA.2006.15","url":null,"abstract":"Although Jabber started from the instance messaging protocol, it became one of the most important toolkits for developing distributed applications. The existing Jabber authentication model doesn't support a mechanism to enable a client to access the servers in another domain directly. This limitation causes data duplication and synchronization problems in developing Jabber based distributed applications. Thus the study proposes a novel IDA (inter-domain authentication). While the well-known Kerberos authentication protocol provides IRA (inter-realm authentication), it requires all realms to implement Kerberos authentication mechanisms. Thus this cannot be used for developing Jabber services which contains various authentication mechanisms simultaneously. The study also presents the verification of security completeness with formal method, BAN logic","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131991278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Effective Policy Management Framework Using RBAC model for Service Platform based on Components 基于组件的服务平台有效的RBAC策略管理框架
Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, D. Baik
User access control is one of the core parts in the developing Internet field. However, in home network service platform and Web service platform, there is no concrete research yet. Therefore, in this paper, we propose the supplemented authorization policy management framework based on RBAC model in the network environment, especially, OSGi service platform and Web service platform. The proposed access control framework tries to enhance the efficiency, assure the privacy, and provide the convenience at the same time. In conclusion, we provide the base to implement the service platform by proposing the effective, safe and convenient framework in authorization and user administration part
用户访问控制是发展中的互联网领域的核心部分之一。然而,在家庭网络服务平台和Web服务平台方面,还没有具体的研究。因此,本文提出了在网络环境下,特别是在OSGi服务平台和Web服务平台下,基于RBAC模型的补充授权策略管理框架。所提出的访问控制框架在提高效率的同时,保证了用户的隐私性,并提供了方便。最后,在授权和用户管理部分提出了有效、安全、便捷的框架,为服务平台的实现提供了基础
{"title":"An Effective Policy Management Framework Using RBAC model for Service Platform based on Components","authors":"Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, D. Baik","doi":"10.1109/SERA.2006.12","DOIUrl":"https://doi.org/10.1109/SERA.2006.12","url":null,"abstract":"User access control is one of the core parts in the developing Internet field. However, in home network service platform and Web service platform, there is no concrete research yet. Therefore, in this paper, we propose the supplemented authorization policy management framework based on RBAC model in the network environment, especially, OSGi service platform and Web service platform. The proposed access control framework tries to enhance the efficiency, assure the privacy, and provide the convenience at the same time. In conclusion, we provide the base to implement the service platform by proposing the effective, safe and convenient framework in authorization and user administration part","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133456725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Apriori, Association Rules, Data Mining,Frequent Itemsets Mining (FIM), Parallel Computing Apriori,关联规则,数据挖掘,频繁项集挖掘,并行计算
M. Yoshikawa, H. Terai
The job-shop scheduling problem is concerned with allocating limited resources to operations over time. Although the job shop scheduling has an important role in various fields, it is one of the most difficult problems in combinational optimization. In this paper, we propose a new scheduling technique that combines Ant Colony Optimization (ACO) with GT method in order to realize effective scheduling. ACO approach has been applied recently to several combinational optimization problems, e.g., TSP and scheduling problem. However, no studies have ever seen the approach of applying hybrid ACO to job-shop problems. Experimental results using benchmark data show improvement comparison with a conventional scheduling technique.
作业车间调度问题涉及随着时间的推移将有限的资源分配给操作。虽然作业车间调度在各个领域都有着重要的作用,但它是组合优化中最困难的问题之一。本文提出了一种将蚁群算法与GT算法相结合的调度方法,以实现有效的调度。蚁群算法近年来已被应用于若干组合优化问题,如TSP和调度问题。然而,目前还没有研究将混合蚁群算法应用于车间作业问题。基于基准数据的实验结果表明,与传统的调度技术相比,该方法有很大的改进。
{"title":"Apriori, Association Rules, Data Mining,Frequent Itemsets Mining (FIM), Parallel Computing","authors":"M. Yoshikawa, H. Terai","doi":"10.1109/SERA.2006.17","DOIUrl":"https://doi.org/10.1109/SERA.2006.17","url":null,"abstract":"The job-shop scheduling problem is concerned with allocating limited resources to operations over time. Although the job shop scheduling has an important role in various fields, it is one of the most difficult problems in combinational optimization. In this paper, we propose a new scheduling technique that combines Ant Colony Optimization (ACO) with GT method in order to realize effective scheduling. ACO approach has been applied recently to several combinational optimization problems, e.g., TSP and scheduling problem. However, no studies have ever seen the approach of applying hybrid ACO to job-shop problems. Experimental results using benchmark data show improvement comparison with a conventional scheduling technique.","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Predictive Dialing System Based on Distributed Call Center 基于分布式呼叫中心的预测拨号系统研究
Linhai Qi, S. Ma, Keqin Liu
With the growing competition in the global marketplace, the call center has become an essential part for many companies. The outbound technology of call center plays a very important role in customer relationship management (CRM) and marketing. The call center of the large service companies usually has the characteristics of wide geographical distribution, high volume of calls, high efficiency and centralized data processing. With the establishment of IP network infrastructure in many large companies, a solution of a distributed IP-based predictive dialing system is discussed, which includes the architectural design, network topological structure and system functions. In the end, the benefit of developing a predictive dialing system using the virtual call center is discussed
随着全球市场竞争的日益激烈,呼叫中心已经成为许多公司必不可少的一部分。呼叫中心的呼出技术在客户关系管理(CRM)和市场营销中起着非常重要的作用。大型服务公司的呼叫中心通常具有地理分布广、呼叫量大、效率高、数据处理集中等特点。随着许多大型企业IP网络基础设施的建立,讨论了一种基于分布式IP的预测拨号系统的解决方案,包括系统的体系结构设计、网络拓扑结构和系统功能。最后,讨论了利用虚拟呼叫中心开发预测拨号系统的好处
{"title":"Research on Predictive Dialing System Based on Distributed Call Center","authors":"Linhai Qi, S. Ma, Keqin Liu","doi":"10.1109/SERA.2006.58","DOIUrl":"https://doi.org/10.1109/SERA.2006.58","url":null,"abstract":"With the growing competition in the global marketplace, the call center has become an essential part for many companies. The outbound technology of call center plays a very important role in customer relationship management (CRM) and marketing. The call center of the large service companies usually has the characteristics of wide geographical distribution, high volume of calls, high efficiency and centralized data processing. With the establishment of IP network infrastructure in many large companies, a solution of a distributed IP-based predictive dialing system is discussed, which includes the architectural design, network topological structure and system functions. In the end, the benefit of developing a predictive dialing system using the virtual call center is discussed","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127263383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Watermark System based on improved security through Pre-Processing of watermarked data using Information of Image Discrete Frequency 利用图像离散频率信息对水印数据进行预处理以提高安全性的数字水印系统
Kyung-Sang Sung, Seung-Heon Lee, Bo-Hyun Wang, H. Oh
Digital watermarking is an insertion technique where specific data that represents copyrights and ownership of multimedia contents such as audio, video, image and texts are inserted, which is a method to prevent illegal distribution, or copying of the product without proper authorization from maker or owner. In this research, unlike the existing image watermarking method wherein watermark is done to the frame itself, a model which extracts audio information within the moving picture, inserts image watermark into the extracted audio information which represents the owner, then combines original image together with digital audio watermark image. Also, suggests a model that improves security of watermark itself, by conducting pre-processing of watermark
数字水印是在音频、视频、图像、文本等多媒体内容中插入代表版权和所有权的特定数据的一种插入技术,是防止未经制作者或所有者授权而非法传播或复制产品的一种方法。在本研究中,不同于现有的图像水印方法对帧本身进行水印,该模型从运动图像中提取音频信息,将图像水印插入提取出来的代表所有者的音频信息中,然后将原始图像与数字音频水印图像组合在一起。提出了一种通过对水印进行预处理来提高水印本身安全性的模型
{"title":"Digital Watermark System based on improved security through Pre-Processing of watermarked data using Information of Image Discrete Frequency","authors":"Kyung-Sang Sung, Seung-Heon Lee, Bo-Hyun Wang, H. Oh","doi":"10.1109/SERA.2006.29","DOIUrl":"https://doi.org/10.1109/SERA.2006.29","url":null,"abstract":"Digital watermarking is an insertion technique where specific data that represents copyrights and ownership of multimedia contents such as audio, video, image and texts are inserted, which is a method to prevent illegal distribution, or copying of the product without proper authorization from maker or owner. In this research, unlike the existing image watermarking method wherein watermark is done to the frame itself, a model which extracts audio information within the moving picture, inserts image watermark into the extracted audio information which represents the owner, then combines original image together with digital audio watermark image. Also, suggests a model that improves security of watermark itself, by conducting pre-processing of watermark","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128795075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Test Data Generation Based on Program Execution 基于程序执行的自动化测试数据生成
Junyi Li, Jiaguang Sun, Yingping Lu
Software test is a very important phase in software development, and an important means to ensure the software's reliability. Path-oriented testing is a main approach in software test. In this paper, an automated test data generation method for linear approximation of bifurcation function is proposed. Combined with predicate slice and definition-use-control (DUG) expression of function, an innovative algorithm for path-oriented testing and automated test data generation is designed. This new algorithm, incorporating DUC expression, can determine whether the sub-path is feasible from the source point. It can also effectively decrease the adverse influence of infeasible path to the algorithm performance. Analysis shows, compared with other existing algorithms that utilize the minimization of bifurcation function method only, that this new algorithm can decrease the number of test cases considerably and increase the test efficiency
软件测试是软件开发的一个非常重要的阶段,是保证软件可靠性的重要手段。面向路径的测试是软件测试的一种主要方法。提出了一种分岔函数线性逼近的测试数据自动生成方法。结合谓词切片和函数的定义-使用-控制(DUG)表达,设计了一种面向路径的测试和自动化测试数据生成算法。该算法结合DUC表达式,可以从源点判断子路径是否可行。它还可以有效地降低不可行的路径对算法性能的不利影响。分析表明,与仅利用分岔函数最小化方法的现有算法相比,该算法可以显著减少测试用例的数量,提高测试效率
{"title":"Automated Test Data Generation Based on Program Execution","authors":"Junyi Li, Jiaguang Sun, Yingping Lu","doi":"10.1109/SERA.2006.20","DOIUrl":"https://doi.org/10.1109/SERA.2006.20","url":null,"abstract":"Software test is a very important phase in software development, and an important means to ensure the software's reliability. Path-oriented testing is a main approach in software test. In this paper, an automated test data generation method for linear approximation of bifurcation function is proposed. Combined with predicate slice and definition-use-control (DUG) expression of function, an innovative algorithm for path-oriented testing and automated test data generation is designed. This new algorithm, incorporating DUC expression, can determine whether the sub-path is feasible from the source point. It can also effectively decrease the adverse influence of infeasible path to the algorithm performance. Analysis shows, compared with other existing algorithms that utilize the minimization of bifurcation function method only, that this new algorithm can decrease the number of test cases considerably and increase the test efficiency","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129451436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using Bayesian Belief Networks to Model Software Project Management Antipatterns 使用贝叶斯信念网络对软件项目管理反模式建模
D. Settas, S. Bibi, P. Sfetsos, I. Stamelos, V. Gerogiannis
In spite of numerous traditional and agile software project management models proposed, process and project modeling still remains an open issue. This paper proposes a Bayesian network (BN) approach for modeling software project management antipatterns. This approach provides a framework for project managers, who would like to model the cause-effect relationships that underlie an antipattern, taking into account the inherent uncertainty of a software project. The approach is exemplified through a specific BN model of an antipattern. The antipattern is modeled using the empirical results of a controlled experiment on extreme programming (XP) that investigated the impact of developer personalities and temperaments on communication, collaboration-pair viability and effectiveness in pair programming. The resulting BN model provides the precise mathematical model of a project management antipattern and can be used to measure and handle uncertainty in mathematical terms
尽管提出了许多传统的和敏捷的软件项目管理模型,过程和项目建模仍然是一个开放的问题。提出了一种基于贝叶斯网络的软件项目管理反模式建模方法。这种方法为项目经理提供了一个框架,他们想要对反模式下的因果关系进行建模,同时考虑到软件项目固有的不确定性。通过反模式的特定BN模型对该方法进行了举例说明。该反模式是使用极限编程(XP)控制实验的经验结果建模的,该实验调查了开发人员的个性和气质对结对编程中的通信、协作对可行性和有效性的影响。由此产生的BN模型提供了项目管理反模式的精确数学模型,并可用于以数学术语度量和处理不确定性
{"title":"Using Bayesian Belief Networks to Model Software Project Management Antipatterns","authors":"D. Settas, S. Bibi, P. Sfetsos, I. Stamelos, V. Gerogiannis","doi":"10.1109/SERA.2006.68","DOIUrl":"https://doi.org/10.1109/SERA.2006.68","url":null,"abstract":"In spite of numerous traditional and agile software project management models proposed, process and project modeling still remains an open issue. This paper proposes a Bayesian network (BN) approach for modeling software project management antipatterns. This approach provides a framework for project managers, who would like to model the cause-effect relationships that underlie an antipattern, taking into account the inherent uncertainty of a software project. The approach is exemplified through a specific BN model of an antipattern. The antipattern is modeled using the empirical results of a controlled experiment on extreme programming (XP) that investigated the impact of developer personalities and temperaments on communication, collaboration-pair viability and effectiveness in pair programming. The resulting BN model provides the precise mathematical model of a project management antipattern and can be used to measure and handle uncertainty in mathematical terms","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Method for Building Domain Ontologies based on the Transformation of UML Models 基于UML模型转换的领域本体构建方法
Hong-Seok Na, O-Hoon Choi, Jung-Eun Lim
Ontologies are used in the integration of information resources by describing the semantics of the information sources with machine understandable terms and definitions. But, creating an ontology is a difficult and time-consuming process, especially in the early stage of extracting key concepts and relations. This paper proposes a method for domain ontology building by extracting ontological knowledge from UML models of existing systems. We compare the UML model elements with the OWL ones and derive transformation rules between the corresponding model elements. Based on these rules, we define an XSLT document which implements the transformation processes. We expect that the proposed method reduce the cost and time for building domain ontologies with the reuse of existing UML models
本体通过用机器可理解的术语和定义描述信息源的语义,用于信息资源的集成。但是,创建本体是一个困难且耗时的过程,特别是在提取关键概念和关系的早期阶段。提出了一种从已有系统的UML模型中提取本体知识的领域本体构建方法。我们将UML模型元素与OWL模型元素进行比较,并推导出相应模型元素之间的转换规则。基于这些规则,我们定义了实现转换过程的XSLT文档。我们期望所提出的方法通过重用现有的UML模型来减少构建领域本体的成本和时间
{"title":"A Method for Building Domain Ontologies based on the Transformation of UML Models","authors":"Hong-Seok Na, O-Hoon Choi, Jung-Eun Lim","doi":"10.1109/SERA.2006.4","DOIUrl":"https://doi.org/10.1109/SERA.2006.4","url":null,"abstract":"Ontologies are used in the integration of information resources by describing the semantics of the information sources with machine understandable terms and definitions. But, creating an ontology is a difficult and time-consuming process, especially in the early stage of extracting key concepts and relations. This paper proposes a method for domain ontology building by extracting ontological knowledge from UML models of existing systems. We compare the UML model elements with the OWL ones and derive transformation rules between the corresponding model elements. Based on these rules, we define an XSLT document which implements the transformation processes. We expect that the proposed method reduce the cost and time for building domain ontologies with the reuse of existing UML models","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128725025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1